top | item 45754358

(no title)

Grikbdl | 4 months ago

If you're going to run code without inspecting it though, the methods are similar. One case has https, the other a signature (which you're trusting due to obtaining it over https). You can't inspect it reliably only after getting hypothetically compromised.

discuss

order

No comments yet.